Overview
Microsoft Internet Explorer 8 is susceptible to a use-after-free vulnerability in the mshtml.dll library.
Description
The use-after-free vulnerability is triggered when handling circular memory references. Full details of the crash can be found at Michal Zalewski's website. Additional details about the fuzzer used to find this vulnerability can be found at Michal Zalewski's blog. |
Impact
An attacker can cause the browser to crash and may be able to execute arbitrary code as the user. |
Solution
We are currently unaware of a practical solution to this problem. |
Internet Explorer users should take advantage of the mitigations provided in Microsoft's Enhanced Mitigation Experience Toolkit. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://lcamtuf.blogspot.com/2011/01/announcing-crossfuzz-potential-0-day-in.html
- http://seclists.org/fulldisclosure/2011/Jan/1
- http://lcamtuf.coredump.cx/cross_fuzz/msie_crash.txt
- http://msdn.microsoft.com/en-us/library/dd361842%28v=vs.85%29.aspx
- http://blogs.technet.com/b/srd/archive/2010/09/02/enhanced-mitigation-experience-toolkit-emet-v2-0-0.aspx
Acknowledgements
This vulnerability was reported to the public by Michal Zalewski.
This document was written by Jared Allar.
Other Information
CVE IDs: | CVE-2011-0346 |
Severity Metric: | 1.11 |
Date Public: | 2011-01-01 |
Date First Published: | 2011-01-06 |
Date Last Updated: | 2011-01-10 12:28 UTC |
Document Revision: | 14 |